-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: align CIDR check rules with their title #307
base: main
Are you sure you want to change the base?
Conversation
@tamirkiviti13 do you have any feedback about this? |
@itaysk |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- if we change the meaning of some check, should we also change the "short name" etc?
- do we no longer need the CIDR functions in Go?
- since we are changing the meaning of some checks, I wonder if we should revisit the severity too.
- additional discussion about check for unrestricted vs public in the original discussion: fix(misconf): improve CIDR related checks trivy#8184 (comment)
|
short names, or any identifier for that matter should be kept unique and unchanged to ensure we don't cause any unexpected breakage. We would have to deprecate this and introduce a new check if change of names is desired. |
# title: Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389. | ||
# title: Network ACLs should not allow ingress from the public internet to port 22 or port 3389. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think /0 is much more straight forward to understand technically, than the public internet.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what do you think of “any IP address”?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure that could work.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe "should not allow unrestricted ingress" ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated 518ae9c
Signed-off-by: Nikita Pivkin <[email protected]>
Signed-off-by: Nikita Pivkin <[email protected]>
Related issues:
Checks that require restricting access to or from any IP address now check only this condition. In addition, the titles, descriptions, and messages for all such checks have been unified.